• Title/Summary/Keyword: SSL

Search Result 293, Processing Time 0.024 seconds

Montgomery Multiplier Base on Modified RBA and Hardware Architecture (변형된 RBA를 이용한 몽고메리 곱셈기와 하드웨어 구조)

  • Ji Sung-Yeon;Lim Dae-Sung;Jang Nam-Su;Kim Chang-Han;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.351-355
    • /
    • 2006
  • RSA 암호 시스템은 IC카드, 모바일 및 WPKI, 전자화폐, SET, SSL 시스템 등에 많이 사용된다. RSA는 모듈러 지수승 연산을 통하여 수행되며, Montgomery 곱셈기를 사용하는 것이 효율적이라고 알려져 있다. Montgomery 곱셈기에서 임계 경로 지연 시간(Critical Path Delay)은 세 피연산자의 덧셈에 의존하고 캐리 전파를 효율적으로 처리하는 문제는 Montgomery 곱셈기의 효율성에 큰 영향을 미친다. 최근 캐리 전파를 제거하는 방법으로 캐리 저장 덧셈기(Carry Save Adder, CSA)를 사용하는 연구가 계속 되고 있다. McIvor외 세 명은 지수승 연산에 최적인 CSA 3단계로 구성된 Montgomery 곱셈기와 CSA 2단계로 구성된 Montgomery 곱셈기를 제안했다. 시간 복잡도 측면에서 후자는 전자에 비해 효율적이다. 본 논문에서는 후자보다 빠른 연산을 수행하기 위해 캐리 전파 제거 특성을 가진 이진 부호 자리(Signed-Digit, SD) 수 체계를 사용한다. 두 이진 SD 수의 덧셈을 수행하는 잉여 이진 덧셈기(Redundant Binary Adder, RBA)를 새로 제안하고 Montgomery 곱셈기에 적용한다. 기존의 RBA에서 사용하는 이진 SD 덧셈 규칙 대신 새로운 덧셈 규칙을 제안하고 삼성 STD130 $0.18{\mu}m$ 1.8V 표준 셀 라이브러리에서 지원하는 게이트들을 사용하여 설계하고 시뮬레이션 하였다. 그 결과 McIvor의 2 방법과 기존의 RBA보다 최소 12.46%의 속도 향상을 보였다.

  • PDF

Design and Implementation of a Web Security System using a Chaos Cipher Algorithm (카오스 암호화 알고리즘을 이용한 웹 보안 시스템 설계 및 구현)

  • Lee, Bong-Hwan;Kim, Cheol-Min;Yun, Dong-Won;Chae, Yong-Ung;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.585-596
    • /
    • 2001
  • In this paper, a new stream cipher algorithm based on the chaos theory is proposed and is applied to a Web security system. The Web security system is composed of three parts: certificate authority (CA), Web client, and Web server. The Web client and server system include a secure proxy client (SPC) and a secure management server (SMS), respectively, for data encryption and decryption between them. The certificate is implemented based on X.509 and the RSA public key algorithm is utilized for key creation and distribution to certify both the client and server. Once a connection is established between the client and server, outgoing and incoming data are encrypted and decrypted, respectively, using one of the three cipher algorithms: chaos, SEED, and DES. The proposed chaos algorithm outperforms the other two conventional algorithms in processing time and complexity. Thus, the developed Web security system can be widely used in electronic commerce (EC) and Internet banking.

  • PDF

A Study on the Strategy for Internet Electronic Commerce of Fashion Industry (패션산업(産業)의 인터넷 전자상거래(電子商去來) 활용방안(活用方案)에 관(關)한 연구(硏究))

  • Chung, Hye-Joo;Cho, Kyu-Hwa
    • Journal of Fashion Business
    • /
    • v.3 no.1
    • /
    • pp.81-92
    • /
    • 1999
  • The purpose of this thesis is to analyze the present conditions and problems of the Electronic Commerce, specially by the fashion companies that utilize the Internet and to propose using plans of Internet Electronic Commerce as a strategic method of fashion companies that have a information-oriented mind to adapt itself to modern century. On the basis of my analysis, I propose some using plans of Internet Electronic Commerce by the fashion companies as follows. As a means of construction method, it is need for the pertinent companies to have an information-oriented mind and then to construct the low-expense but high-speed communication Infrastructure. As an operation and management method, positive web site advertisements plans, such as promotion, using various mass media, subscribing to the Internet search engines and dissemination of products information, etc., are need for companies to attract the consumers to connect to the web site. Second, to offer more satisfactory experiences, it is need for companies to frame the integrated shopping mall as a strategic alliance in the management of shopping mall. To frame the integrated shopping mall is also effective in solving financial problems of shopping mall management and introducing of security system As a means of technology supplement, security management systems, such as SSL or SET, should be introduced for consumers to pay the price and furnish their personal informations. Second, new technology developments, such as the newest simulation programs using Virtual Reality to solve the problem of products' actual feeling, should be need for consumers to feel as they really put clothes on. If these technological developments are realized, fashionable products will be dealt in the Internet shopping mall as well and the marketability of Internet shopping mall will be expanded.

  • PDF

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF

Weakness of Andriod Smartphone Applications against Electromagnetic Analsysis (안드로이드 기반 스마트폰 어플리케이션의 전자기파분석 공격 취약성)

  • Park, JeaHoon;Kim, Soo Hyeon;Han, Daewan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1017-1023
    • /
    • 2013
  • With the growing use of smartphones, many secure applications are performed on smartphones such as banking, payment, authentication. To provide security services, cryptographic algorithms are performed on smartphones' CPU. However, smartphone's CPU has no considerations against side-channel attacks including Electromagnetic Analysis (EMA). In DesignCon 2012, G. Kenworthy introduced the risk of cryptographic algorithms operated on smartphone against EMA. In this paper, using improved experimental setups, we performed EMA experiments on androin smartphones' commercial secure applications. As a result, we show that the weakness of real application. According to the experimental setups, we picked up the operation of w-NAF scalar multiplication from the operation of Google's Play Store application using radiated EM signal. Also, we distinguished scalar values (0 or not) of w-NAF scalar multiplication.

Design of High-Speed VPN for Large HD Video Contents Transfer (대용량 HD 영상콘텐츠 고속전송 VPN(Virtual Private Network)의 설계)

  • Park, Hyoungy-Ill;Shin, Yong-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.111-118
    • /
    • 2012
  • When broadcasters want immediately a variety of VOD files in a distributed server of them data centers and away contents provider, CPs of different platform to exchange high-quality HD, 3DTV video and other video files over the IP networks of high-performance that can be transferred quickly and must be configured quickly. This paper, by using an optional encryption method to complement a QoS and security of public network, suggests high speed and secure content transmission protocol such as VPN(Virtual Private Network) for large video files and big data. As configured high performance VPN, end to end devices use the best of available resources over public network by parallel transfer protocol and the secure content delivery network.

The Ultrasonographic Evaluation of Digital Flexor Tendon in the Palmar Pastern Region of Normal Racing Horse (정상 경주마의 앞발바닥갓관절부 굽힘근힘줄의 초음파학적 평가)

  • Kim, Kun-Tae;Kim, Joon-Young;Jeong, Soon-Wuk
    • Journal of Veterinary Clinics
    • /
    • v.25 no.2
    • /
    • pp.90-95
    • /
    • 2008
  • One fresh equine cadaver (two forelimbs) and five non-lamed thoroughbreds (ten sound forelimbs) were examined ultrasonographically through 5.0 MHz linear array transducer with a stand-off pad in palmar pastern region. The normal transverse ultrasonographic images of the superficial digital flexor tendon (SDFT), deep digital flexor tendon (DDFT), straight sesamoidean ligament (SSL), oblique sesamoidean ligament (OSL), and medium scutum could be identified at the region. The mean $\pm$ SD (min.$\sim$max. $mm^2$) of SDFT cross-sectional areas at P1A, P1B, P1C in the region were $110.00{\pm}5.38$ ($100{\sim}128$), $100.00{\pm}5.02$ ($90{\sim}111$), $114.00{\pm}3.33$ ($104{\sim}124$), respectively. The mean $\pm$ SD (min.$\sim$max. $mm^2$) of DDFT cross-sectional areas at each phalanx (P1A, P1B, P1C, P2A, P2B) were $136.00{\pm}4.83$ ($125{\sim}147$), $94.00{\pm}5.43$ ($85{\sim}108$), $99.00{\pm}4.87$ ($90{\sim}111$), $115.00{\pm}3.67$ ($108{\sim}124$), $135.00{\pm}3.65$ ($125{\sim}145$), respectively. The mean ratio of SDFT of P1B to DDFT was 0.74, 1.06, 1.01, 0.87, 0.74 at P1A, P1B, P1C, P2A, P2B, respectively.

An Experimental Study on Longitudinal Shear Capacity of Composite Slab Embedded with Silence Insulator (방음재를 삽입한 합성슬래브의 수평전단성능에 관한 실험적 연구)

  • Lee, Seon-Keun;Lee, Chy-Hyoung;Yoon, Sung-Kee
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.5
    • /
    • pp.64-71
    • /
    • 2018
  • This paper provides the results for experimental study on longitudinal shear performance for new-concept composite slabs embedded with silence insulator. Longitudinal shear capacity tests are used to predict characteristics of composite action between the concrete block, silence insulator and deckplate. A total set of 7 Push-Down specimens are tested to clarify the composite action between the concrete block, silence insulator and deckplate. Parameters in this study are the width of T-type bar, the depth of reinforced bar and the thickness of silence insulator. The results from experimental study on longitudinal shear capacity for new-concept composite slabs applied T-type bar, Reinforced bar and Silence insulator are summarized as follows. In test result, the Longitudinal Shear Capacity of the new concept specimen is 2 times excellent than basic specimen with safety. It is expected that applying the proposed composite slab detail at the actual site will provide a significant safety factor in structural aspect of the existing composite slab, and greatly contribute to the improvement capacities of resisting vibration and sound.

A Study on the Quality Improvement of Bread Using the Whole Waxy Sorghum Flours Prepared with Different Milling Methods (분쇄방법을 달리한 통곡 찰수수가루를 이용한 수수빵의 제조 및 품질 개선)

  • Ryu, Bog-Mi;Kim, Chang-Soon
    • Korean journal of food and cookery science
    • /
    • v.30 no.3
    • /
    • pp.262-270
    • /
    • 2014
  • This study was conducted in order to investigate the properties of bread making and quality improvement when wheat flour is replaced with whole waxy sorghum flour. Sorghum flour, which was prepared with two types of milling methods of pin mill and ultra fine pulverization, was used at different levels ranging from 10, 20 and 30%, respectively. The pasting properties of peak viscosity, setback viscosity and pasting temperature of the composite flour containing pin-milled sorghum flour were higher than those of ultra fine pulverized sorghum flour. The volumes of sorghum bread were lower than that of wheat bread; moreover, they gradually decreased with increasing amounts of sorghum flour, which has inferior dough properties and therefore collapses in the oven. The use of vital gluten (12% based on sorghum flour weight) and emulsifier (SSL; sodium stearoyl lactylate) increased the extensibility and resistance to the extension of the dough, thereby improving its rheological properties. Thus, the oven spring of bread containing sorghum was improved, demonstrating as loaf volume increase up to 15%. However, in the case of breads containing 30% sorghum flour, the loaf volumes were still unacceptably low. Therefore, the formula and the bread making process were further modified as follows: An increase of vital gluten ($12%{\rightarrow}18%$) and shortening ($3%{\rightarrow}6%$), a decrease of mixing time and dough fermentation temperature, and the addition of sorghum flour after gluten development during mixing. The above modifications resulted in the improvement of sorghum bread quality. Therefore, we suggest that pin-milled sorghum flour is more appropriate than ultra fine pulverized sorghum flour for making bread.

A Design of Smart Fuzzing System Based on Hybrid Analysis (하이브리드 분석 기반의 스마트 퍼징 시스템 설계)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.175-180
    • /
    • 2017
  • In accordance with the development of IT industry worldwide, software industry has also grown tremendously, and it is exerting influence on the general society starting from daily life to financial organizations and public institutions. However, various security threats that can inflict serious threat to provided services in proportion to the growing software industry, have also greatly increased. In this thesis, we suggest a smart fuzzing system combined with black box and white box testing that can effectively detectxdistinguish software vulnerability which take up a large portion of the security incidents in application programs.